Armitage – A Step by Step guide on How to Use to Hack Windows with Backtrack 5 R2/3:

General description: MITM

MITM [Man in the middle] attacks from wikipedia:

The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fiwireless access point, can insert himself as a man-in-the-middle).

A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other — it is an attack on mutual authentication (or lack thereof). Most cryptographic protocols include some form of endpointauthentication specifically to prevent MITM attacks. For example, SSL can authenticate one or both parties using a mutually trusted certification authority.

[ hana-code-insert ] '468×15' is not found

In this tutorial I will:

Scan my whole lab network

map it using Armitage

set up a VNC viewer as my payload to view a target computer’s screen.

Note that this may not work if you have some antivirus software in your victim’s PC.

for those of you who are more of the optimistic – here is how to perform the attack by using Armitage automatic exploitation tools.

filters the exploits using known information and then sorts them into an optimal order.

In this case we will use the Attacks –> Hail Mary feature:

Attacks –> Hail Mary

[ hana-code-insert ] '468×15' is not found

Attacks –> Hail Mary – In action

[ hana-code-insert ] '468×15' is not found

even though you can also use manual exploitation for more specific targets:

Armitage exploitation manuals

[ hana-code-insert ] '468×15' is not found

Armitage guide Step 4 – Targeting a victim machine

After Hail Mary finishes scanning the hosts and finds a vulnerable host on your network it will show a red color frame with lightnings on the vulnerable machine in the Armitage console.

if you found no vulnerable machine, then maybe you can try using a manual exploitation to exploit the target (like shown in the above image).

[mc4wp_form]

Armitage guide Step 5 – Choosing the desired Payload

Choose Meterpreter Payload

(Meterpreter enables users to control the screen of a device using VNC and to browse, upload and download files.)

Choosing the desired Payload

[ hana-code-insert ] '468×15' is not found

Because the program already does most of the work for us (for major vulnerability and known vulnerability) we just need to connect to meterpreter which is ready to interact!

you can choose between Command Shell, Meterpreter Shell, or VNC. In this case, we will use VNC.

Armitage guide Step 6 – Connect to target machine

After choosing VNC desktop as a payload, there’s a pop up window which tells us to run VNC viewer to connect to our local address with a specific port(written there).

Now open up a new terminal and type vncviewer:port command to open a VNC session to the victim machine, like so:

Connect to target machine

[ hana-code-insert ] '468×15' is not found

There’s your VNC window for target machine remote desktop

VNC for target machine remote desktop

I hope you liked this article, please feel free to leave comments, ask questions or sharing this article.

[ hana-code-insert ] '468×15' is not found

[mc4wp_form]

1. Geek-KB.com does not encourage, condone, or orchestrate attempts to hack into other servers or any other illegal activities. The articles contained inside this website are for entertainment / educational purposes only, and what actions people decide to take outside of this website are strictly independent of Geek-KB.com. We are not responsible if you break the law using techniques listed on this website.

2. Geek-KB.com has the sole discretion to remove/edit users, articles, external resources, or any other user-submitted content to protect itself from legal harm. This legal disclaimer may be modified at any time without notice.

3. Any damage caused by using any of the techniques taken from https://www.geek-kb.com is on your own responsibility, Use it at your own risk!